US20170208465A1 - Communication apparatus, method of sharing communication parameters, and program - Google Patents

Communication apparatus, method of sharing communication parameters, and program Download PDF

Info

Publication number
US20170208465A1
US20170208465A1 US15/404,847 US201715404847A US2017208465A1 US 20170208465 A1 US20170208465 A1 US 20170208465A1 US 201715404847 A US201715404847 A US 201715404847A US 2017208465 A1 US2017208465 A1 US 2017208465A1
Authority
US
United States
Prior art keywords
information
authentication
communication apparatus
authentication process
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/404,847
Other languages
English (en)
Inventor
Tsuyoshi Terao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TERAO, TSUYOSHI
Publication of US20170208465A1 publication Critical patent/US20170208465A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present disclosure relates to an apparatus that communicates communication parameters.
  • Japanese Patent Laid-Open No. 2014-60623 discloses a technique for facilitating setting of these communication parameters. According to Japanese Patent Laid-Open No. 2014-60623, the communication apparatus displays a QR code® including information on the communication parameters. The QR code® is imaged and read, and the read communication parameters are set in an access point.
  • a communication apparatus includes an acquisition unit that acquires information for setting wireless communication parameters, a first generation unit that generates authentication information using random information randomly set and information for use in an authentication process included in the acquired information, a second generation unit that generates authentication information using the information for use in the authentication process included in the acquired information and without using the random information, an authentication unit that, when the acquired information includes predetermined information indicating that the authentication process is to be performed using the authentication information generated using the random information, performs the authentication process involving wireless communication of the authentication information generated by the first generation unit with another communication apparatus, and when the acquired information does not include the predetermined information, performs the authentication process involving wireless communication of the authentication information generated by the second generation unit with the another communication apparatus, and a setting unit that, when authentication succeeds, sets the wireless communication parameters to the another communication apparatus with which the wireless communication has been performed in the authentication process.
  • FIG. 1 is a diagram illustrating a hardware configuration of a communication apparatus.
  • FIG. 2 is a diagram illustrating a software configuration of the communication apparatus operating as a providing apparatus.
  • FIG. 3 is a diagram illustrating a software configuration of the communication apparatus operating as a reception apparatus.
  • FIG. 4 is a diagram illustrating a configuration of a communication system.
  • FIG. 5 is a flowchart of operations of a smart phone.
  • FIG. 6 is a flowchart of operations of a camera.
  • FIG. 7 is a flowchart of operations of a printer.
  • FIG. 8 is a sequence chart of the communication system.
  • FIG. 9 is a sequence chart of the communication system.
  • authentication information is included in code information such as a QR code® to set communication parameters by imaging the code information, and when authentication between apparatuses by the use of the authentication information has succeeded, the communication parameters can be passed to improve security.
  • code information printed on labels attached to the housing of a device or packaging associated with a device cannot be changed. That is, the device corresponding to the code information can be identified from the information included in the code information printed on the label. Accordingly, to perform authentication based on the authentication information included in such unchanged code information, the device-identifiable information is sent over a wireless interface. Transmitting the device-identifiable information over a wireless interface is not preferred from a viewpoint of privacy protection because a malicious third party may be able to obtain the device-identifiable information.
  • authentication information is generated, for example, using the information included in the code information and random information randomly set.
  • Apparatuses that can display the code information on displays can, for example, change and dynamically display the code information. Accordingly, the authentication information included in the code information can be variable in individual processes, and the device-identifiable information is not sent over the wireless interface. However, even in the case of non-device-identifiable information, when authentication is attempted using random information to generate authentication information, the time to conduct the authentication can become long and increase the processing load.
  • An embodiment enables setting communication parameters with a compatibility between the protection of privacy and the prevention of unnecessary increase in the time to conduct authentication and/or unnecessary increase in processing load.
  • a communication apparatus will be explained below in detail with reference to the drawings.
  • a wireless LAN system in conformity with IEEE802.11 series is used.
  • the communication mode is not limited to the wireless LAN in conformity with the IEEE802.11 series.
  • the embodiment is also applicable to communication apparatuses in conformity with other wireless communication methods such as Bluetooth®, near field communication (NFC), or ZigBee.
  • the embodiment is also applicable to communication apparatuses in conformity with wired communication methods such as a wired LAN.
  • FIG. 4 is a diagram illustrating a configuration of a communication system according to the present embodiment.
  • the communication system includes a smart phone 401 , a camera 402 , and a printer 403 .
  • a process in the case where the camera 402 and the printer 403 are joined in a wireless network 404 (hereinafter, called network) formed by the smart phone 401 will be explained below.
  • the apparatuses can be other apparatuses, such as, for example, a cellular phone, a PC, a video camera, a smart watch, or a PDA. While the number of apparatuses in the present communication system is three, the number of apparatuses is not limited to three.
  • the smart phone 401 operates as an access point in an infrastructure mode defined in the IEEE802.11 series standards.
  • the other apparatuses operate as stations (STA) in the infrastructure mode defined in the IEEE802.11 series standards.
  • the network 404 can be formed by the smart phone 401 as a group owner of Wi-Fi Direct® and the camera 402 and the printer 403 as clients of Wi-Fi Direct®.
  • the network 404 can be a network formed by an apparatus different from the smart phone 401 , the camera 402 , and the printer 403 as an access point (AP).
  • the communication apparatus 101 includes a control unit 102 , that includes a CPU or an MPU (not illustrated), which controls the communication apparatus 101 by executing programs stored in a storage unit 103 .
  • the control unit 102 can control the communication apparatus 101 in cooperation with an operating system (OS) executed by the control unit 102 .
  • the control unit 102 also performs a control to communicate and share communication parameters with other communication apparatuses.
  • OS operating system
  • the storage unit 103 includes a ROM and a RAM (not illustrated) to store programs for performing various operations described below and various kinds of information, such as wireless communication parameters. The various operations described below are performed by the control unit 102 executing control programs stored in the storage unit 103 .
  • a storage medium other than the ROM and the RAM can be used as the storage unit 103 , such as a flexible disk, a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a CD-R, a magnetic tape, a non-volatile memory card, or a DVD.
  • a wireless unit 104 performs wireless communication via a wireless LAN in conformity with the IEEE802.11 series standards or the like.
  • the wireless unit 104 includes, for example, a chip (not illustrated) for performing the communication.
  • the wireless unit 104 can include hardware for performing short-range wireless communication via networks other than a wireless LAN, for example, via NFC or the like.
  • a display unit 105 can be any type of display, for example, an LCD or an LED, that displays visually recognizable information, and in some instances, can also output sounds via speakers.
  • An antenna control unit 106 and antenna 107 are used for wireless communication.
  • An operation unit 108 enables a user to perform various kinds of input operations and the like to operate the communication apparatus 101 .
  • a timer unit 109 detects lapses of time.
  • a functional unit 110 is hardware enabling the communication apparatus 101 to execute predetermined processes.
  • the functional unit 110 is an image capturing unit including an imaging element, a lens, and the like to capture still or moving images.
  • the functional unit 110 is a printing unit that performs print processing.
  • FIG. 2 is a software functional block diagram of the smart phone 401 .
  • the software functional blocks illustrated in FIG. 2 are stored as programs in the storage unit 103 , and the programs are executed by the control unit 102 to perform the functions.
  • the control unit 102 implements the functions by controlling the hardware and computing and processing information according to the control programs.
  • Some or all of the functional blocks can be provided via hardware. In this case, some or all of the functional blocks are, for example, implemented by an application specific integrated circuit (ASIC).
  • ASIC application specific integrated circuit
  • a communication parameter providing unit 202 provides communication parameters in a communication-parameter setting process for setting the wireless communication parameters.
  • the communication-parameter setting process is a process in which a providing apparatus provides the wireless communication parameters to a reception apparatus so that these apparatuses can share the communication parameters.
  • the communication parameters include wireless communication parameters necessary for wireless LAN communication, such as a service set identifier (SSID) as a network identifier, an encryption method, a network key, an encryption key, an authentication method, or an authentication key.
  • the communication parameters can include a MAC address, a passphrase, an IP address for performing communication in the IP layer, information necessary for higher-level services, etc.
  • the communication parameters can include one or all of the foregoing parameters.
  • the communication-parameter setting process can be based on Wi-Fi Protected Setupm (WPS) or Wi-Fi Direct®.
  • WPS Wi-Fi Protected Setupm
  • Wi-Fi Direct® Wi-Fi Direct®
  • a code information acquisition unit 203 acquires an image captured by the functional unit 110 (image capturing unit) of the smart phone 401 shooting code information including a public key and the identifier of the communication apparatus for use in setting the communication parameters.
  • the code information can be a two-dimensional code such as a CP code or a QR code® or a one-dimensional code such as a bar code.
  • a code information analysis unit 204 analyzes the image of the code information acquired by the code information acquisition unit 203 and acquires the encoded information.
  • the code information can include information for use in the communication-parameter setting process.
  • the information for use in the communication-parameter setting process is information such as a public key and the identifier of the apparatus for use in an authentication process.
  • the public key is information used for enhancing security in the communication-parameter setting process and can be information such as a certificate or a password.
  • the public key is an encryption key for use in a public key cryptosystem.
  • An authentication processing unit 205 executes an authentication process with another communication apparatus in the communication-parameter setting process.
  • the communication parameter providing unit 202 provides the communication parameters to the other communication apparatus.
  • a selection unit 206 selects the activation or deactivation of a privacy protection function based on the information acquired by the code information analysis unit 204 .
  • the privacy protection function is a function in which authentication information obtained by processing the public key acquired by the code information analysis unit 204 and random information randomly set, such as a random number, by a predetermined calculation method is used in the authentication process by the authentication processing unit 205 .
  • the random information is not used, but the authentication information obtained by processing the public key acquired by the code information analysis unit 204 by a predetermined calculation method is used in the authentication process by the authentication processing unit 205 .
  • a packet reception unit 207 and a packet transmission unit 208 control transmission and reception of all packets, including communication protocols in upper layers.
  • the packet reception unit 207 and the packet transmission unit 208 also control the wireless unit 104 to exchange packets, in conformity with the IEEE802.11 series standards, with another communication apparatus.
  • a connection processing unit 209 establishes a wireless connection with another communication apparatus.
  • a data storage unit 210 controls software and the writing and reading of various kinds of information into and from the storage unit 103 .
  • FIG. 3 is a software functional block diagram of the camera 402 and the printer 403 .
  • the software functional blocks illustrated in FIG. 3 are stored as programs in the storage unit 103 and the programs are executed by the control unit 102 to perform the functions.
  • the control unit 102 implements the functions by controlling the hardware and computing and processing information according to the control programs. Some or all of the functional blocks can be provided via hardware. In this case, some or all of the functional blocks are implemented, for example, by an ASIC.
  • a communication parameter acquisition unit 302 receives the communication parameters from the providing apparatus in the communication-parameter setting process for setting the wireless communication parameters.
  • a code information generation unit 303 generates code information including information such as a public key and the identifier of the apparatus for use in setting the communication parameters.
  • the generated code information can be dynamically generated at each execution of the communication-parameter setting process. Alternatively, the generated code information can be set at the time of shipment from the factory and the device-specific information stored in the storage unit 103 can be coded.
  • the static code information fixed information
  • the static code information can be code information described on the shipping packaging, such as cardboard boxes or wrapping materials.
  • the static code information can be code information set at the time of shipment from the factory or the like and is obtained by coding the device-specific information stored in the storage unit 103 .
  • the static information is fixed information that is not dynamically changed.
  • a code information display controller 304 displays the code information generated by the code information generation unit 303 on the display unit 105 .
  • the printer 403 can include a function of printing the code information generated by the code information generation unit 303 via the functional unit 110 (printing unit) instead of or in addition to the code information display controller 304 . In this case, the printer 403 prints the code information generated by the code information generation unit 303 via the functional unit 110 (printing unit) in accordance with a user's start instruction for the communication-parameter setting process.
  • An authentication processing unit 305 executes an authentication process with another communication apparatus in the communication-parameter setting process.
  • the communication parameter acquisition unit 302 receives the communication parameters from the other communication apparatus.
  • a determination unit 306 determines whether to use the privacy protection function in the communication-parameter setting process. When only the code information dynamically generated by the code information generation unit 303 is to be used in the communication-parameter setting process, the camera 402 and the printer 403 do not have the determination unit 306 or use the privacy protection function at any time. In addition, when only the code information described in the operation manual or the like is to be used in the communication-parameter setting process, the camera 402 and the printer 403 do not have the determination unit 306 at any time, but use the privacy protection function.
  • a packet reception unit 307 and a packet transmission unit 308 control transmission and reception of all packets including the communication protocols of the higher-level layers.
  • the packet reception unit 307 and the packet transmission unit 308 also control the wireless unit 104 to exchange packets, with another communication apparatus, in conformity with the IEEE802.11 series standards.
  • a connection processing unit 309 establishes a wireless connection with another communication apparatus.
  • a data storage unit 310 controls software and the writing and reading of various kinds of information into and from the storage unit 103 .
  • the smart phone 401 captures and image of the code information on the camera 402 and the printer 403 and provides the communication parameters for making a connection to the network 404 in the communication-parameter setting process based on the information included in the code information.
  • the communication parameters provided by the smart phone 401 to the camera 402 and the printer 403 can be information for making a connection to a wireless network formed by the smart phone 401 or information for making a connection to a wireless network formed by another apparatus.
  • the operations in the flowchart of FIG. 5 are started when the user, via the operation unit 108 of the smart phone 401 provides an instruction for a communication parameter setting mode to execute the communication-parameter setting process.
  • the smart phone 401 Upon receipt of the instruction for the communication parameter setting mode, the smart phone 401 starts the functional unit 110 (image capturing unit).
  • the smart phone 401 captures the code information using the functional unit 110 (image capturing unit) (S 501 ) and decodes the code information based on the captured image.
  • the smart phone 401 can terminate the process with an error message.
  • the smart phone 401 acquires the public key and the identifier of the apparatus from the code information as information for use in the authentication process as the information necessary for the communication-parameter setting process.
  • the identifier of the apparatus can be, for example, a MAC address or an UUID.
  • the smart phone 401 selects whether to activate the privacy protection function in the authentication process based on the information acquired at S 501 (S 502 ).
  • the information necessary for the communication-parameter setting process includes the information on whether to activate the privacy protection function.
  • the information on whether to activate the privacy protection function can be information indicating whether the public key included in the code information is set dynamically or statically.
  • the smart phone 401 selects the deactivation of the privacy protection function.
  • the smart phone 401 selects the activation of the privacy protection function.
  • the information on whether to activate the privacy protection function can be information indicative of the display method for the code information.
  • the smart phone 401 selects the deactivation of the privacy protection function.
  • the smart phone 401 selects the activation of the privacy protection function.
  • the information on whether to activate the privacy protection function can be information indicating whether the information for use in the authentication process is device-specific information.
  • the smart phone 401 selects the deactivation of the privacy protection function.
  • the smart phone 401 selects the activation of the privacy protection function.
  • the information on whether to activate the privacy protection function can be information for use in the authentication process.
  • the smart phone 401 selects the deactivation of the privacy protection function.
  • the smart phone 401 selects the activation of the privacy protection function.
  • the information on whether to activate the privacy protection function can be information indicating whether the information for use in the authentication process is information by which the device corresponding to the information can be identified.
  • the smart phone 401 selects the deactivation of the privacy protection function.
  • the smart phone 401 selects the activation of the privacy protection function.
  • the attributes for use in the selection at S 502 can be, for example, represented by character strings in the information acquired at S 501 .
  • the attributes can be represented by, for example, integer values or bit patterns indicative of the attributes in the information acquired at S 501 .
  • the information on whether to activate the privacy protection function can be exchanged between the apparatuses via wireless communication.
  • the smart phone 401 When selecting the activation of the privacy protection function (S 502 : Yes), the smart phone 401 generates random information varying in each authentication process (S 503 ).
  • the random information is a random number.
  • the generated random number can be used only for use in privacy protection, or can be identical to a random number for use in the subsequent authentication process and parameter exchange process.
  • the current time information can be used instead of the random number.
  • a hash value in the time information can be used instead of the random number.
  • the smart phone 401 generates authentication information based on the random number generated at S 503 and the information for use in the authentication process obtained from the code information (S 504 ).
  • the code information includes the information on the public key as the information for use in the authentication process.
  • the smart phone 401 calculates the hash value for an information sequence in which the public key and the random number are combined to obtain the authentication information.
  • the authentication information is not limited to this, and can be, for example, the hash value calculated from some or all of the data in the information for use in the authentication process obtained from the code information and the random number.
  • the hash function for use in generation of the hash value can be SHA-1, SHA-2, MD5, etc.
  • the smart phone 401 When selecting the deactivation of the privacy protection function (S 502 : No), the smart phone 401 generates the authentication information using the information for use in the authentication process obtained from the code information (S 505 ).
  • the code information includes the information on the public key as the information for use in the authentication process.
  • the smart phone 401 calculates the hash value for the public key to obtain the authentication information.
  • the random information generated at S 503 is not used.
  • the smart phone 401 After generating the authentication information at S 504 or S 505 , the smart phone 401 transmits an authentication request signal for making a request for an authentication process to another communication apparatus (S 506 and S 509 ).
  • the authentication request signal is an Action frame defined in the IEEE802.11 series standards.
  • the authentication request signal is not limited to this, and can be an extensible authentication protocol (EAP) signal or any other wireless LAN packet.
  • the authentication request signal includes the authentication information generated at S 504 or S 505 .
  • the authentication request signal can be transmitted in a unicast using the identifier of the apparatus obtained from the code information.
  • the authentication request signal transmitted at S 506 includes the random number generated at S 503 .
  • the authentication request signal transmitted at S 506 can include other information for use in the authentication process, such as the encryption key and the apparatus name of the smart phone 401 , as well as the authentication information and the random number.
  • the authentication request signal can also include the identifier of an algorithm indicative of the calculation method used at the time of calculating identification information.
  • the authentication request signal transmitted at S 506 can include the character string “PubkeyNonceHash” indicating that the authentication information was generated using the random number.
  • the authentication request signal transmitted at S 509 can include the character string “PubkeyHash” indicating that the authentication information was generated as a hash value without using the random number.
  • the authentication request signal includes an integer value or a bit pattern indicating a generation algorithm for the authentication information on whether the random number was used.
  • the smart phone 401 After transmitting the authentication request signal, the smart phone 401 waits for an authentication response signal as a response to the authentication request signal. Upon receipt of the authentication response signal, the smart phone 401 performs the authentication process based on the information included in the authentication response signal (S 507 ). At S 507 , the smart phone 401 can, for example, perform authentication by the public key encryption method to share a common key as the identical encryption key between the two apparatuses. Alternatively, the smart phone 401 can perform authentication by determining whether there is a match between the authentication information included in the received authentication response signal and the authentication information generated at S 504 or S 505 .
  • the authentication in the authentication process succeeds when there is a match between the authentication information included in the received authentication request signal and the authentication information generated at S 504 or S 505 .
  • the smart phone 401 can re-transmit the authentication request signal or terminate the process with an error message.
  • the smart phone 401 executes a process for setting the communication parameters to the other communication apparatus (S 508 ). This is called communication-parameter exchange process.
  • the other communication apparatus with which the authentication process was performed at S 507 transmits a setting request signal for making a request for the communication parameters to the smart phone 401 .
  • the smart phone 401 Upon receipt of the setting request signal, the smart phone 401 transmits a response signal including the communication parameters.
  • the communication parameters are encrypted using the common key shared in the authentication process. This enhances security at the time of providing the communication parameters.
  • the smart phone 401 can establish a wireless network as an AP using the provided communication parameters. Alternatively, the smart phone 401 can connect to a wireless network established by the other communication apparatus using the provided communication parameters. The smart phone 401 may not necessarily connect to the network to which the communication parameters are provided, but can terminate the operation after the completion of the communication-parameter exchange process.
  • the operations of the camera 402 will now be explained with reference to the flowchart described in FIG. 6 .
  • the operations in the flowchart of FIG. 6 are implemented by the control unit 102 of the camera 402 executing the control program stored in the storage unit 103 , calculating and processing the information, and controlling the hardware.
  • Some or all of the steps in the flowchart of FIG. 6 can, for example, be implemented by hardware such as an ASIC.
  • the operations in the flowchart of FIG. 6 are started when the user gives an instruction for the communication parameter setting mode to execute the communication-parameter setting process by the operation unit 108 of the camera 402 .
  • the operations in the flowchart of FIG. 6 can be started when a predetermined signal is received or a predetermined condition, i.e., a specific time has come, the camera 402 is in a predetermined place, etc., is satisfied as a trigger.
  • the camera 402 generates the information for use in the authentication process of the communication-parameter setting process (S 601 ).
  • the camera 402 selects whether to set the information for use in the authentication process as dynamic information or static information (S 613 ). That is, the camera 402 switches between the use and non-use of the privacy protection function according to the displayed code information.
  • the camera 402 can always set the information for use in the authentication process as dynamic information and perform the communication-parameter setting process with the deactivation of the privacy protection function. In this case, the camera 402 does not execute step S 613 and steps S 609 to S 612 described below.
  • the camera 402 When setting the information for use in the authentication process as dynamic information, that is, when not using the privacy protection function, the camera 402 generates the authentication process based on the information for use in the authentication process generated at S 601 (S 602 ). At S 602 , the camera 402 calculates the information for use in the authentication process by a predetermined calculation algorithm to obtain a hash value. The camera 402 does not use the random information in the calculation of the hash value at S 602 .
  • the camera 402 generates code information by coding information necessary for the communication-parameter setting process including the information for use in the authentication process generated at S 601 , and displays the same on the display unit 105 (S 603 ).
  • the code information displayed at S 603 includes the information indicating the deactivation of the privacy protection function.
  • the information on whether to activate the privacy protection function can be information indicating whether the public key included in the code information was set dynamically or statically.
  • the information on whether to activate the privacy protection function can be information indicating the display method of the code information.
  • the information on whether to activate the privacy protection function can be information indicating whether the information for use in the authentication process is device-specific information.
  • the information on whether to activate the privacy protection function can be information indicating whether the information for use in the authentication process is persistent information.
  • the information on whether to activate the privacy protection function can be information indicating whether the information for use in the authentication process was set dynamically.
  • the code information displayed at S 603 can, for example, include the MAC address of the camera 402 .
  • the camera 402 waits for receipt of an authentication request signal (S 604 ).
  • the authentication request signal is an Action frame defined in the 802.11 series standard.
  • the authentication request signal is not limited to this, and can be an EAP signal or any other wireless LAN packet.
  • the camera 402 Upon receipt of the authentication request signal (Yes: S 604 ), the camera 402 determines whether there is a match between the authentication information included in the received authentication request signal and the authentication information calculated at S 602 (S 605 ). When there is no match between the authentication information, that is, when the authentication has failed (S 605 : No), the camera 402 returns to S 604 to wait for an authentication request signal again. Alternatively, the camera 402 can transmit a signal indicative of an authentication error to the smart phone 401 to terminate the process described in FIG. 6 . As with the authentication request signal, the error signal can also be an Action frame or an EAP signal. When the authentication has failed, the camera 402 can provide an error indication on the display unit to bring the error condition to a user's attention. Alternatively, when the authentication has failed, the camera 402 can terminate the operation without transmitting an error signal. Still alternatively, when the authentication has failed, the camera 402 can return to S 601 to generate code information again.
  • the camera 402 When setting the information for use in the authentication process as static information, that is, when using the privacy protection function, the camera 402 generates code information by coding information necessary for the communication-parameter setting process including the information for use in the authentication process generated at 5601 .
  • the camera 402 displays the generated code information on the display unit 105 (S 609 ).
  • the code information displayed at S 609 includes the information indicating the activation of the privacy protection function.
  • the camera 402 sets the device-specific information of the camera 402 as the information for use in the authentication process.
  • the device-specific information of the camera 402 is information by which the camera 402 can be identified, such as, for example, the identification information of the camera 402 or the public key of the camera 402 .
  • the camera 402 waits for receipt of an authentication request signal (S 610 ).
  • the camera 402 calculates a hash value based on the random information included in the received authentication request signal and the information for use in the authentication process generated at S 601 , thereby generating the authentication information (S 611 ).
  • the camera 402 waits again for an authentication request signal.
  • the camera 402 can transmit a signal indicative of an authentication error or terminate the process with an error message.
  • the camera 402 determines whether there is a match between the authentication information included in the received authentication request signal and the authentication information calculated at S 611 (S 612 ). When there is no match between the authentication information, that is, when the authentication has failed (S 612 : No), the camera 402 returns to S 610 to wait again for an authentication request signal. Alternatively, the camera 402 can transmit a signal indicative of an authentication error to the smart phone 401 to terminate the process described in FIG. 6 . As with the authentication request signal, the error signal can also be an Action frame or an EAP signal. When the authentication has failed, the camera 402 can provide an error indication on the display unit to bring the error condition to a user's attention. Alternatively, when the authentication has failed, the camera 402 can terminate the operation without transmitting an error signal. Still alternatively, when the authentication has failed, the camera 402 can return to S 601 to generate code information again.
  • the camera 402 transmits an authentication response signal indicating that the authentication has succeeded to the transmission source of the authentication request signal (S 606 ).
  • the authentication response signal includes information necessary for execution of the authentication process at the transmission source of the authentication request signal.
  • the authentication response signal includes information such as the encryption key, authentication information, public key, and random numbers.
  • security can be enhanced by encrypting and communicating the authentication information.
  • the encryption can be performed using a Diffie-Hellman (DH) key sharing method, a public key cryptosystem, etc.
  • DH Diffie-Hellman
  • the camera 402 can generate an encryption key common to the camera 402 and the other communication apparatus and use the same as a common key for use in subsequent encryption communications.
  • the camera 402 executes the communication-parameter exchange process for acquiring and setting the communication parameters (S 607 ).
  • the camera 402 transmits a setting request signal for requesting the communication parameters to the other communication apparatus with which the authentication process has been performed. Then, the camera 402 receives a response signal including the communication parameters and sets the received communication parameters.
  • the communication parameters are encrypted using the common key shared in the authentication process. This enhances security at the provision of the communication parameters.
  • the camera 402 Upon acquisition of the communication parameters, the camera 402 connects to a wireless network using the acquired communication parameters (S 608 ). Then, the camera 402 wirelessly communicates with the other communication apparatus.
  • the operations in the flowchart of FIG. 7 are implemented by the control unit 102 of the printer 403 executing the control program stored in the storage unit 103 , calculating and processing the information, and controlling the hardware. Some or all of the steps in the flowchart of FIG. 7 can, for example, be implemented by hardware such as an ASIC.
  • the operations in the flowchart of FIG. 7 are started when the user gives an instruction for the communication parameter setting mode to execute the communication-parameter setting process by the operation unit 108 of the printer 403 .
  • the operations in the flowchart of FIG. 7 can be started when a predetermined signal is received or a predetermined condition, i.e., a specific time has come, the printer 403 is in a predetermined place, etc., is satisfied as a trigger.
  • a predetermined signal i.e., a specific time has come, the printer 403 is in a predetermined place, etc.
  • the following description is based on the assumption that the printer 403 does not have the function of dynamically changing the information for use in the authentication process.
  • the printer 403 uses the code information printed on the printer's 403 housing, documented in the printer's 403 operation manual, located on the printer's 403 packaging, etc., in the communication-parameter setting process.
  • the information indicated by the code information is stored in the storage unit 103 of the printer 403 and is can be read and used by the control unit 102 .
  • the code information includes the information indicating that the privacy protection function is to be activated.
  • the printer 403 acquires the information for use in the authentication process from the storage unit 103 (S 701 ).
  • the printer 403 waits for receipt of an authentication request signal (S 702 ).
  • the printer 403 Upon receipt of the authentication request signal (S 702 : Yes), the printer 403 generates the authentication information based on the information for use in the authentication process and the random information included in the received authentication request signal (S 703 ).
  • the code information printed on the housing, the operation manual, the package, etc., as described above includes the information on the public key of the printer 403 for use in the authentication process.
  • the printer 403 acquires the authentication information by calculating a hash value for an information sequence in which the public key and the random information, such as a random number, are combined.
  • the printer 403 determines whether there is a match between the authentication information included in the received authentication request signal and the authentication information generated at S 703 (S 704 ). When there is no match between the authentication information, that is, when the authentication has failed (S 704 : No), the printer 403 returns to S 702 to wait again for an authentication request signal. Alternatively, the printer 403 can transmit a signal indicative of an authentication error and terminate the process described in FIG. 7 .
  • the error signal can be an Action frame or an EAP signal.
  • Step S 705 When it is determined at 5704 that there is a match between the authentication information included in the received authentication request signal and the authentication information generated at 5703 , that is, when the authentication has succeeded (S 704 : Yes), the printer 403 transmits an authentication response signal indicating that the authentication has succeeded (S 705 ). Step S 705 and subsequent steps are the same as steps S 606 to S 608 described in FIG. 6 , and therefore, descriptions thereof will be omitted.
  • FIG. 8 is a sequence chart in which the camera 402 acquires the communication parameters from the smart phone 401 .
  • the sequence in which the camera 402 deactivates the privacy protection function will be explained with reference to FIG. 8 .
  • the camera 402 generates the information for use in the authentication process (F 801 ). Next, the camera 402 generates the authentication information based on the generated information for use in the authentication process (F 802 ). Then, the camera 402 generates a QR code® based on the information for use in the authentication process, and displays the same on the display unit 105 (F 803 ). The smart phone 401 captures the QR code® of the camera 402 to acquire the information for use in the authentication process (F 804 ).
  • the smart phone 401 determines that the privacy protection function is not to be activated based on the information included in the QR code®, and calculates the authentication information based on the information for use in the authentication process without using a random number (F 805 ). Then, the smart phone 401 transmits an authentication request signal including the calculated authentication information to the camera 402 (F 806 ).
  • the camera 402 Upon receipt of the authentication request signal, the camera 402 performs the authentication process based on the authentication information calculated by the camera 402 and the authentication information included in the received authentication request signal. When the authentication succeeds, the camera 402 transmits an authentication response signal including the information on the encryption key to the smart phone 401 (F 807 ).
  • the smart phone 401 receives the authentication response signal and executes the authentication process based on the information included in the signal. When the authentication succeeds, the smart phone 401 transmits an authentication confirmation signal to the communication apparatus (F 808 ) to notify the camera 402 that the authentication has succeeded.
  • the camera 402 Upon receipt of the authentication confirmation signal, the camera 402 transmits a setting request signal for making a request for the communication parameters to the smart phone 401 (F 809 ). Upon receipt of the setting request signal, the smart phone 401 transmits a setting response signal including the communication parameters to the camera 402 (F 810 ). In this case, the smart phone 401 can encrypt the communication parameters using the common encryption key shared in the authentication process.
  • the camera 402 Upon receipt of the communication parameters, the camera 402 connects to a wireless network established by the smart phone 401 (F 811 ). Upon completion of the connection, the camera 402 can perform data communications with the smart phone 401 on the wireless network.
  • FIG. 9 is a sequence chart in which the printer 403 acquires the communication parameters from the smart phone 401 .
  • the printer 403 acquires the information for use in the authentication process from the storage unit (F 901 ).
  • the smart phone 401 captures the QR code® described included on the printer's 403 housing, the printer's 403 packaging, the printer's 403 operation manual to acquire the information for use in the authentication process (F 902 ).
  • the smart phone 401 determines the activation of the privacy protection function based on the information included in the QR code®, and generates a random number (F 903 ).
  • the smart phone 401 generates the authentication information based on the information for use in the authentication process acquired from the QR code® and the random number (F 904 ).
  • the smart phone 401 transmits the authentication request signal including the generated identification information and the random number to the printer 403 (F 905 ).
  • the printer 403 Upon receipt of the authentication request signal, the printer 403 generates the authentication information based on the information for use in the authentication process stored in the storage unit and the random number included in the authentication request (F 906 ). Then, the printer 403 performs the authentication process based on the generated identification information and the authentication information included in the received authentication request signal. When the authentication succeeds, the printer 403 transmits the authentication response signal including the information on the encryption key generated in the authentication process to the smart phone 401 (F 907 ). The printer 403 then performs the same steps as F 808 to F 811 with the smart phone 401 , and the printer 403 and the smart phone 401 start communication (F 908 to F 911 ).
  • the random information is used to generate provisional authentication information not specific to the device. Therefore, the device-specific information is not wirelessly transmitted to protect privacy.
  • the authentication information is generated without using the random information and the information included in the authentication request signal, it is possible to reduce the time taken for the authentication process and the processing load while protecting privacy.
  • the dynamically set information is used to set the communication parameters, there is no need to generate the authentication information at each receipt of the authentication request signal, and it is possible to reduce the time taken for the authentication process and the processing load.
  • the method of acquiring the information necessary for the communication-parameter setting process using the code information, such as a QR code®, has been explained.
  • the information necessary for the communication-parameter setting process can be exchanged via wireless communication using a wireless LAN in the IEEE802.11 series, NFC, or Bluetooth®.
  • the smart phone 401 transmits a transmission request signal for making a request for transmission of the information for use in the authentication process.
  • the transmission request signal is an Action frame defined in the 802 . 11 series standard.
  • the transmission request signal is not limited to this, and can be an EAP signal or any other wireless LAN packet.
  • the request signal can be encrypted in advance by the encryption key shared between the smart phone 401 and the other communication apparatus.
  • the character string representing the encryption key displayed on the display unit of the other communication apparatus can be input via the operation unit 108 of the smart phone 401 to share the encryption key between the apparatuses.
  • the smart phone 401 waits for a response signal to the request signal.
  • the response signal includes the information for use in the authentication process.
  • the information for use in the authentication process can, for example, include the public key.
  • the response signal can also include information other than the information for use in the authentication process.
  • the response signal can include information on whether to activate the privacy protection function.
  • the information for use in the authentication process can be encrypted by the same encryption key as that used for encryption of the request signal or another encryption key.
  • the smart phone 401 Upon receipt of the response signal, the smart phone 401 determines whether to activate the privacy protection function. For example, the smart phone 401 can determine whether to activate the privacy protection function based on the information included in the received response signal.
  • the subsequent steps are the same as step S 502 and subsequent steps.
  • the receiving apparatus i.e., the camera 402 or the printer 403 waits for a request signal wirelessly transmitted from the smart phone 401 .
  • the receiving apparatus can display the character string indicative of the encryption key for use in the encryption of the request signal on the display unit 105 prior to waiting for the request signal.
  • the receiving apparatus wirelessly transmits a response signal to the smart phone 401 .
  • the response signal includes the information for use in the authentication process.
  • the information for use in the authentication process can, for example, include the public key.
  • the request signal can also include the information on whether to activate the privacy protection function.
  • the information can be represented in the form of integer value, bit pattern, or character string.
  • the transmission response signal can include information other than the foregoing information.
  • the information for use in the authentication process can be encrypted by the same encryption key as that used for decoding the request signal or another encryption key.
  • the receiving apparatus Upon receipt of the request signal, the receiving apparatus waits for receipt of an authentication request signal from the smart phone 401 .
  • the subsequent steps are the same as the steps S 604 to S 608 or S 702 to S 707 described in FIG. 6 , and therefore, descriptions thereof will be omitted.
  • the information necessary for the communication-parameter setting process can be provided by using communication in the IEEE802.11 series standard instead of by capturing a QR code® including the code information.
  • the device-specific information can be encrypted before exchanged to protect privacy.
  • the information necessary for the communication-parameter setting process can be exchanged using communication based on NFC, Bluetooth®, ZigBee, or TransferJet®.
  • the information necessary for the communication-parameter setting process can be exchanged via NFC, and the communication parameters can be provided via communication in conformity with the IEEE802.11 series standard.
  • the information for use in the authentication process can be treated as dynamically generable information.
  • the NFC interface is an autonomously non-rewritable tag
  • the information for use in the authentication process can be treated as dynamically non-generable information.
  • the smart phone 401 can determine whether to activate the privacy protection function depending on the kind of the method used in acquisition of the information necessary for the communication-parameter setting process. For example, when acquiring the information for use in the authentication process by capturing the code information or NFC, the smart phone 401 can always activate the privacy protection function. When acquiring the information for use in the authentication process via the IEEE802.11 series standard or Bluetooth®, the smart phone 401 can always determine the deactivation of the privacy protection function.
  • compatibility in setting the communication parameters, can be established between the protection of privacy and the prevention of unnecessary increase in the time taken for the authentication or unnecessary increase in the processing load.
  • Embodiments can also be implemented by supplying a program for performing one or more of the above-described functions to a system or an apparatus via a network or a storage medium, and one or more processors in a computer of the system or the apparatus reading and executing the program.
  • embodiments can be implemented by a circuit performing one or more functions, e.g., an ASIC.
  • Embodiment(s) can also be realized by a computer of a system or apparatus that reads out and executes computer executable instructions (e.g., one or more programs) recorded on a storage medium (which may also be referred to more fully as a ‘non-transitory computer-readable storage medium’) to perform the functions of one or more of the above-described embodiment(s) and/or that includes one or more circuits (e.g., application specific integrated circuit (ASIC)) for performing the functions of one or more of the above-described embodiment(s), and by a method performed by the computer of the system or apparatus by, for example, reading out and executing the computer executable instructions from the storage medium to perform the functions of one or more of the above-described embodiment(s) and/or controlling the one or more circuits to perform the functions of one or more of the above-described embodiment(s).
  • computer executable instructions e.g., one or more programs
  • a storage medium which may also be referred to more fully as a ‘non-
  • the computer may comprise one or more processors (e.g., central processing unit (CPU), micro processing unit (MPU)) and may include a network of separate computers or separate processors to read out and execute the computer executable instructions.
  • the computer executable instructions may be provided to the computer, for example, from a network or the storage medium.
  • the storage medium may include, for example, one or more of a hard disk, a random-access memory (RAM), a read only memory (ROM), a storage of distributed computing systems, an optical disk (such as a compact disc (CD), digital versatile disc (DVD), or Blu-ray Disc (BD)TM), a flash memory device, a memory card, and the like.
US15/404,847 2016-01-18 2017-01-12 Communication apparatus, method of sharing communication parameters, and program Abandoned US20170208465A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2016007426A JP2017130727A (ja) 2016-01-18 2016-01-18 通信装置、通信パラメータの共有方法、プログラム
JP2016-007426 2016-01-18

Publications (1)

Publication Number Publication Date
US20170208465A1 true US20170208465A1 (en) 2017-07-20

Family

ID=59315212

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/404,847 Abandoned US20170208465A1 (en) 2016-01-18 2017-01-12 Communication apparatus, method of sharing communication parameters, and program

Country Status (2)

Country Link
US (1) US20170208465A1 (ja)
JP (1) JP2017130727A (ja)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10585632B2 (en) 2018-03-30 2020-03-10 Brother Kogyo Kabushiki Kaisha Printer and non-transitory computer-readable recording medium storing computer-readable instructions for printer
US10671718B2 (en) * 2017-05-26 2020-06-02 Samsung Sds Co., Ltd. System and method for authentication
US11029897B2 (en) * 2018-05-22 2021-06-08 Brother Kogyo Kabushiki Kaisha Communication device, non-transitory computer-readable medium storing computer-readable instructions for communication device and method executed by communication device
US11816370B2 (en) 2017-12-22 2023-11-14 Canon Kabushiki Kaisha Communication apparatus that provides a communication parameter and method of controlling the same

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7266727B2 (ja) * 2017-12-22 2023-04-28 キヤノン株式会社 通信装置およびその制御方法
JP2024014385A (ja) * 2022-07-22 2024-02-01 オムロンヘルスケア株式会社 管理システム、測定装置、情報端末、及び情報端末の作動プログラム

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10671718B2 (en) * 2017-05-26 2020-06-02 Samsung Sds Co., Ltd. System and method for authentication
US11816370B2 (en) 2017-12-22 2023-11-14 Canon Kabushiki Kaisha Communication apparatus that provides a communication parameter and method of controlling the same
US10585632B2 (en) 2018-03-30 2020-03-10 Brother Kogyo Kabushiki Kaisha Printer and non-transitory computer-readable recording medium storing computer-readable instructions for printer
US11061629B2 (en) 2018-03-30 2021-07-13 Brother Kogyo Kabushiki Kaisha Printer and non-transitory computer-readable recording medium storing computer-readable instructions for printer
US11455132B2 (en) * 2018-03-30 2022-09-27 Brother Kogyo Kabushiki Kaisha Printer and non-transitory computer-readable recording medium storing computer-readable instructions for printer
US11789675B2 (en) * 2018-03-30 2023-10-17 Brother Kogyo Kabushiki Kaisha Printer and non-transitory computer-readable recording medium storing computer-readable instructions for printer
US11029897B2 (en) * 2018-05-22 2021-06-08 Brother Kogyo Kabushiki Kaisha Communication device, non-transitory computer-readable medium storing computer-readable instructions for communication device and method executed by communication device
US20210294544A1 (en) * 2018-05-22 2021-09-23 Brother Kogyo Kabushiki Kaisha Communication Device, Non-Transitory Computer-Readable Medium Storing Computer-Readable Instructions for Communication Device and Method Executed by Communication Device
US11733939B2 (en) * 2018-05-22 2023-08-22 Brother Kogyo Kabushiki Kaisha Communication device configured to establish wireless connection between communication device and external device, non-transitory computer-readable medium storing computer-readable instructions for such communication device and method executed by such communication device
US20230342095A1 (en) * 2018-05-22 2023-10-26 Brother Kogyo Kabushiki Kaisha Communication device, non-transitory computer-readable medium storing computer-readable instructions for communication device and method executed by communication device

Also Published As

Publication number Publication date
JP2017130727A (ja) 2017-07-27

Similar Documents

Publication Publication Date Title
US20170208465A1 (en) Communication apparatus, method of sharing communication parameters, and program
US20200154276A1 (en) Communication device, control method for communication device, and non-transitory computer-readable storage medium
US11683382B2 (en) Communication device, method for controlling communication device, and program
US11570619B2 (en) Communication apparatus, communication method, and storage medium
US10575171B2 (en) Communication apparatus, communication method, and storage medium
US20210195410A1 (en) Communication apparatus, communication method, and non-transitory computer-readable storage medium
US10685104B2 (en) Communication apparatus, control method for communication apparatus, and storage medium
JP6827773B2 (ja) 通信装置、通信方法及びプログラム
KR101963545B1 (ko) 통신 장치, 통신 방법, 및 프로그램
US10117099B2 (en) Communication apparatus, method for controlling the same, and program
US20230070058A1 (en) Communication apparatus, communication method, and non-transitory computer-readable storage medium
WO2017126311A1 (ja) 通信装置、通信方法及びプログラム
JP2018042057A (ja) 通信装置、通信装置の制御方法及びプログラム
US11018868B2 (en) Communication apparatus, method and program for controlling the apparatus, and storage medium storing the program
JP7387283B2 (ja) 通信装置、通信装置の制御方法およびプログラム
JP2020043473A (ja) 通信装置、通信方法及びプログラム
JP6525783B2 (ja) 通信装置、提供方法、および、プログラム

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TERAO, TSUYOSHI;REEL/FRAME:042183/0138

Effective date: 20161222

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION